All Episodes

February 4, 2024 39 mins

 

This is an enlightening conversation with Michael Smith exploring the intersection between vulnerabilities, DDoS and WAF technologies. 

Join us as we reconvene with cybersecurity virtuoso Michael Smith, Field CTO at Verkara, for a rerecording further to explore the fascinating intersection of cybersecurity and cloud technology. Listen in as Michael brings his wealth of experience from military intelligence to web application development to the table, shedding light on how engineering and integration teams navigate regulations and government sector compliance.

 

The episode is brought to you by Phoenix Security; get in control of your vulnerabilities from code to cloud with the power of Phoenix. ACT Now on the most important vulnerabilities and reduce your exposure to modern attacks. See it for yourself. Go to https://phoenix.security/request-a-demo/ for a free 14-day licence.

Our conversation ventures into the complexities of application security and the strategic utilization of vulnerabilities. Venture into the murky waters of cyberattacks with us as we discuss how vulnerabilities can be harnessed for DDoS attacks, causing chaos at both the network and application layers. Hear about Phoenix Security Limited's role in software security and how unvalidated pagination can be exploited to strain databases and servers. We wrap up this segment by contrasting the precision of these attacks with broader network-level DDoS strategies, offering insight into crafting robust cybersecurity defenses. Cap off this episode with a crucial discussion on the ethical dimensions of technology. Discover the challenges of differentiating between benign and malicious bot activity, and how technologies like domain fronting have dual purposes. We stress the importance of vigilance and responsibility in the tech sphere, where the same tools can secure or compromise systems. Remember to stay engaged with the content by checking your logs for anomalies and sharing your thoughts for a chance to win an Amazon gift card. Michael's insights are a reminder of the persistent evolution and nuanced nature of cybersecurity in our interconnected world.  

Tune in to this enlightening episode to equip yourself with the knowledge and insights needed to navigate the evolving landscape of cybersecurity.

  • 00:02: Introduction to Cybersecurity and Cloud Podcast
  • 00:53: Host and Guest Introduction
  • 01:40: Michael Smith's Journey in Cybersecurity
  • 03:23: Shift Towards Security
  • 04:22: The Evolution of Cybersecurity Roles
  • 06:58: Challenges in IoT and Hardware Security
  • 08:22: Insights from Akamai and Handling Major Incidents
  • 09:58: The Evolution of Cybersecurity Threats
  • 11:35: The Current State of Cybersecurity
  • 14:49: The Future of Cybersecurity and Emerging Threats
  • 17:22: Leveraging Vulnerabilities for DDoS Attacks
  • 22:51: Addressing Sophisticated Cybersecurity Threats
  • 26:27: Advanced Cybersecurity Techniques and Challenges
  • 29:00: The Importance of Collaboration in Cybersecurity
  • 33:58: Closing Thoughts and Positive Takeaways
  • 39:01: Outro and Acknowledgments

 

 

  • Cyber Security and Cloud Podcast hosted by Francesco Cipollone
  • Twitter @FrankSEC42
  • Linkedin: linkedin.com/in/fracipo 
  • #CSCP #cybermentoringmonday cybercloudpodcast.com 

 

 

#Cybersecurity, #appsec #waf 

Mark as Played

Advertise With Us

Popular Podcasts

Dateline NBC
The Nikki Glaser Podcast

The Nikki Glaser Podcast

Every week comedian and infamous roaster Nikki Glaser provides a fun, fast-paced, and brutally honest look into current pop-culture and her own personal life.

Stuff You Should Know

Stuff You Should Know

If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2024 iHeartMedia, Inc.